lud

joined 1 year ago
[–] lud@lemm.ee 1 points 1 hour ago

50% more monthly is a lot more though.

[–] lud@lemm.ee 1 points 2 hours ago

Self-sxtracting*

[–] lud@lemm.ee 2 points 2 hours ago

You probably just forgot or miss typed.

[–] lud@lemm.ee 2 points 2 hours ago

At least the accounts are more secure now when they are Microsoft accounts. I remember being quite annoyed that Mojang accounts didn't support MFA.

[–] lud@lemm.ee 1 points 13 hours ago

3rd party towing and "storage fees" should be illegal. It should be operated by the city and the parking ticket should pay for the cost the city goes through (not funding the cops)

Agreed. I do think there should also be a punitive fine for breaking the law and blocking the street though. Storage fees also make sense if you don't collect the car X amount of days. Storage isn't free but maybe you included those costs in "the cost the city goes through".

Also third party towing isn't a bad thing if they are simply contractors to the city.

[–] lud@lemm.ee 1 points 13 hours ago

Yeah, I'm guessing there are many reasons that they don't disclose that.

[–] lud@lemm.ee 11 points 14 hours ago

if anyone is interested.

Nah I'm good 👍

Fucking hell.

[–] lud@lemm.ee 1 points 15 hours ago

That's pretty similar to some of the bannings on Lemmy.

[–] lud@lemm.ee 1 points 21 hours ago

Yeah, at least the ones I used have some kind of console/terminal you can use and often you can access BIOS and reinstall the OS if you want.

[–] lud@lemm.ee 2 points 21 hours ago (2 children)

At least when it comes to games, they likely don't want to disclose to potential cheaters how they detected them.

It's also a support burden to look into every case of automated bans.

[–] lud@lemm.ee 3 points 22 hours ago* (last edited 22 hours ago)

I don't mean them specifically, but that to me managing access to such a CA cert's keys is security nightmare, because if I somehow get an infection, and it finds the cert file and the private key, it'll be much easier for it to make itself more persistent than I want it.

If you can't resist installing random shit on your CA server then sure. No attacker will really try to compromise a home CA so you really only have to worry about viruses which should be kept extremely far from the CA anyways. And obviously follow all other security precautions like good passwords or even passwordless with certificate login (remember that you have a CA server so you can easily issue authentication certificates and enroll them on a smart card or Yubikey)

The private key should also be in TPM (or a HSM like we do at work, but that's a bit extreme for home use) and be non-exportable. Managing access to the private key isn't really that hard, it should just never ever leave the CA server and you are pretty much good to go.

You can also do a two tier PKI with an offline CA and an issuing CA like I'm planning to do for an AD DS, AD CS, AD FS lab.

Personally I think wildcard certificates sound like a bigger security problem than a CA since that certificates will likely be placed on a lot of servers and if just a single one gets compromised the attacker can impersonate whatever subdomain they feel like. With a CA server you could issue individual certificates to each server/service

Private CA servers are very common and is actually a security positive. I'm not saying that everyone needs one at home, but you shouldn't be afraid to setup one if you want too.

view more: next ›